0% found this document useful (0 votes)
66 views

10 2023

Uploaded by

indianway7860
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views

10 2023

Uploaded by

indianway7860
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 53

JAN-2023

NPTEL Online Certification Courses

Indian Institute of Technology Kharagpur

Cloud Computing
Assignment- Week 0
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1:
Which of the following ports is a registered port in network paradigm?
a) 20
b) 1020
c) 36255
d) 58628
Correct Answer: (c)
Detailed Solution: Ports with numbers 0–1023 are called system or well-known ports, ports with
numbers 1024 – 49151 are called user or registered ports, and ports with numbers 49152 – 65535
are called dynamic, private or ephemeral ports. Here only the port with number 36255 is a
registered port.

QUESTION 2:
Which device uses a logical addressing system?
a) Hub
b) Router
c) Bridge
d) Switch

Correct Answer: (b)


Detailed Solution: Router uses logical addressing system.

QUESTION 3:
Which of the following is FALSE?
a) Kernel level threads cannot share the code segment.
b) User level threads are not scheduled by the kernel.
c) Context switching between user level threads is faster than context switching between
kernel level threads.
d) When a user level thread is blocked, all other threads of its process are blocked.

Correct Answer: (a)


Detailed Solution: Kernel-level threads can share code segments. So, A is FALSE. User level
threads are scheduled by the thread library and the kernel is not involved. So, B is TRUE. Context
1
JAN-2023

NPTEL Online Certification Courses

Indian Institute of Technology Kharagpur

switching between user level threads is faster as they have no actual context-switch, nothing is
saved while for kernel level threads, Registers, PC and SP must be saved and restored. So, C is
TRUE. When a user level thread is blocked, all other threads of its process are blocked. So, D is
TRUE.

QUESTION 4:
In classful addressing, the IP address 192.2.255.255 belongs to which class?
a) Class A
b) Class B
c) Class C
d) Class D

Correct Answer: (c)


Detailed Solution: In Class C, IP addresses range from 192.0.0.x to 223.255.255.x where x is a
positive integer between 0 and 255.

QUESTION 5:
Consider a system with 2 level caches. The access times of Level 1 cache, Level 2 cache, and main
memory are 2 ns, 25 ns, and 200 ns, respectively. The hit rates of Level 1 cache, Level 2 cache and
main memory are 0.6, 0.8 and 1, respectively. What is the average access time of the system,
ignoring the search time within the cache?
a) 20.5 ns
b) 25.2 ns
c) 24 ns
d) 22.5 ns
Correct Answer: (b)
Detailed Solution: Average access time = [H1*T1]+[(1-H1)*H2*T2]+[(1-H1)(1-H2)*Hm*Tm]
H1 = Hit rate of level 1 cache = 0.6
T1 = Access time for level 1 cache = 2 ns
H2 = Hit rate of level 2 cache = 0.8
T2 = Access time for level 2 cache = 25 ns
Hm = Hit rate of Main Memory = 1
Tm = Access time for Main Memory = 200 ns

QUESTION 6:
Increasing the RAM of a computer typically improves performance because:
a) Larger RAMs are faster
b) Fewer page faults occur
c) Fewer segmentation faults occur

2
JAN-2023

NPTEL Online Certification Courses

Indian Institute of Technology Kharagpur

d) Virtual memory increases

Correct Answer: (b)


Detailed Solution: When RAM size is bigger, the page table would have more entries of pages,
which increases the probability of a page being present in the page table, hence the number of page
faults is lower.

QUESTION 7:
Match the following columns for the TCP/IP protocol stack:

Protocol TCP/IP Layer

1. IP A. Transport Layer
2. UDP B. Application Layer
3. SMTP C. Data link Layer
4. PPP D. Network Layer

a) 1-D, 2-A, 3-B, 4-C


b) 1-C, 2-A, 3-D, 4-B
c) 1-B, 2-C, 3-A, 4-D
d) 1-A, 2-C, 3-D, 4-B

Correct Answer: (a)


Detailed Solution: IP is a network layer protocol, UDP is a transport layer protocol, SMTP is an
application layer protocol and PPP is a data link layer protocol. Hence option (a) is correct.

QUESTION 8:
Consider a system with byte-addressable memory, 32-bit logical addresses, 8 Kilobyte page size
and page table entries of 4 Bytes each. The size of the page table in the system is:
a) 1 MB
b) 512 KB
c) 4 MB
d) 2 MB

Correct Answer: (d)


Detailed Solution: For byte-addressable memory, 1 word = 1 Byte.
32
Logical address size = 2 Bytes
13
Page size = 8 KB = 2 Bytes
3
JAN-2023

NPTEL Online Certification Courses

Indian Institute of Technology Kharagpur

Page table entry size = 4 Bytes


2
32
19
Number of pages = 13 =2 Bytes
2
Page table size = Number of pages × Page table entry size
19
=2 ×4
21
= 2 Bytes
= 2 MB

QUESTION 9:
The transport layer protocols used for real time multimedia, file transfer, DNS and email,
respectively are:

a) TCP, UDP, UDP and TCP


b) UDP, TCP, TCP and UDP
c) TCP, UDP, TCP and UDP
d) UDP, TCP, UDP and TCP

Correct Answer: (d)


Detailed Solution:
1. For real-time multimedia applications the packets must be delivered faster. Small packet
losses are not important. Hence UDP is used.
2. For file transfer applications, FTP is used which relies on TCP.
3. Domain Name Server (DNS) generally employs UDP as its underlying transport layer
protocol.
4. E-mail employs SMTP which also uses TCP.
Hence, option (d) is correct.

QUESTION 10:
In OSI network architecture, the routing is performed by:
a) Network Layer
b) Transport Layer
c) Data Link Layer
d) Session Layer

Correct Answer: (a)


Detailed Solution: In OSI network architecture, the routing is performed by the network layer.

4
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


Cloud Computing
Assignment-Week 1
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1:
A distributed system is preferred when the task is: i)Data-intensive; ii)Computing-intensive

A. Only (i)
B. Only (ii)
C. Both (i) and (ii)
D. Neither (i) nor (ii)

Correct Answer: C
Detailed Solution: A distributed system is preferred when the task is both data and
computing-intensive

QUESTION 2:
The “Grid” in the distributed grid computing paradigm links together power plants of different
kinds.

A. True
B. False

Correct Answer: B
Detailed Solution: The grid in distributed grid computing paradigm links together computing
resources and provides the mechanism needed to access them.

QUESTION 3:
Which one of the following is/are the advantage(s) of cloud computing?
A. Resource pooling
B. It requires an always-on internet connection.
C. Ubiquitous
D. On-demand payment policy

Correct Answer: A, C, D

Detailed Solution: Cloud computing brings resource pooling, ensures ubiquitousness and
provides an on-demand payment policy.
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


QUESTION 4:

The distributed system ensures ‘robustness’ of performance.


A. True
B. False

Correct Answer: A

Detailed Solution: The distributed system ensures ‘robustness’ of performance. No Single point of
failure.

QUESTION 5:
What is(are) the characteristic(s) of using cluster computing?

A. Parallel programming
B. Faster network than a typical LAN
C. Low-latency communication protocols
D. None of these.

Correct Answer: A,B, C

Detailed Solution: Clusters are deployed to improve the speed over LAN-connected single
standalone computers. Its key components are parallel programming and ensuring Low-latency
communication protocols.

QUESTION 6:
Web access to commercial software is one of the SaaS (Software as a Service) characteristics in the
cloud computing paradigm.

A. True
B. False

Correct Answer: A

Detailed Solution: Web access to commercial software is one of the SaaS characteristics in the
cloud computing paradigm.
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


QUESTION 7:
Example(s) of PaaS (Platform as a Service) tool(s) is(are):
A. Microsoft Powerpoint
B. Microsoft Azure
C. Google App Engine
D. Google mail service

Correct Answer: B, C

Detailed Solution: Examples of PaaS tools are Microsoft Azure and Google app engine.

QUESTION 8:
IaaS (Infrastructure as a Service) in cloud computing delivers (i) storage; (ii) servers.
A. Only (i)
B. Only (ii)
C. Both (i) and (ii)
D. Neither (i) nor (ii)
Correct Answer: C

Detailed Solution: IaaS is a computing platform that allows developers to quickly create software
or online applications by delivering storage, servers, networks, OSs and on-demand service.

QUESTION 9:

IaaS (Infrastructure as a Service) is the best option where regulatory compliance makes the
offshoring or outsourcing of data storage and processing difficult
A. True
B. False

Correct Answer: B

Detailed Solution: IaaS may not be the best option where regulatory compliance makes the
offshoring or outsourcing of data storage and processing difficult
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


QUESTION 10:

What is/are the main requirement(s) of a Cloud Service Provider (CSP)?

A. Increase agility
B. Increase cost
C. Increase productivity
D. Decrease cost

Correct Answer: A,C

Detailed Solution: CSP looks forward to enhancing productivity and agility.


JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


Cloud Computing
Assignment-Week 2
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1:
Example(s) of Public cloud is(are)

A. Eucalyptus
B. Ubuntu Enterprise Cloud (UEC)
C. Microsoft ECI data centre
D. Amazon EC2

Correct Option: D
Detailed Answer: Amazon EC2 is a Public cloud.

QUESTION 2:
Which of the following is/are XML parser API(s)?
A. XaaS (Anything as a Model)
B. SAX (Simple API to XML)
C. CLI (Command Line Interface)
D. DOM (Document Object Model)

Correct Option: B, D
Detailed Answer: DOM and SAX are two of the three generic parser APIs. They read XML data,
check for syntax, and make data available to an application.

QUESTION 3:
The public cloud provides total visibility and control over data regarding security.
A. True
B. False
Correct Option: B
Detailed Answer: Public cloud provides limited visibility and control over data regarding security.
Say, subscribers cannot verify that data has been completely detected from the provider’s
systems.
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


QUESTION 4:
In the case of on-site private cloud, organizations consider (i) network dependency; (ii) no risk from
multi-tenancy.

A. Only (i)
B. Only (ii)
C. Both (i) and (ii)
D. Neither (i) nor (ii)

Correct Option: A
Detailed Answer: The risk of multi-tenancy is there is an on-site private cloud as workloads of
different clients may reside concurrently on the same systems and local networks, separated only
by access policies implemented by a cloud provider’s software. Network dependency is also
considered.

QUESTION 5:
____________ is an XML language for processing XML.
A. Javascript
B. ECMA script
C. CSS
D. XSLT

Correct Option: D
Detailed Answer: XSLT( eXtensible Stylesheet Language) is an XML language for processing
XML.

QUESTION 6:
Cloud Manager is the public access point to the cloud where subscribers sign up for accounts.
A. True
B. False

Correct Option: A
Detailed Answer: Cloud Manager is the public access point to the cloud where subscribers sign
up for accounts and has a mechanism for authenticating subscribers.
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


QUESTION 7:
___________ generally stores the cloud subscriber’s metadata like user credentials and OS images.

A. SLA (Service Level Agreement)


B. Cloud Manager
C. DOS (Data Object storage)
D. MOS (Metadata Object storage)

Correct Option: C
Detailed Answer: DOS generally stores the cloud subscriber’s metadata like user credentials and OS
images.

QUESTION 8:
Which of these is responsible for the operation of a collection of computers that are connected via
high speed local area networks in the cloud computing paradigm?
A. Cloud Manager
B. Computer Manager
C. Cluster Manager
D. None of these.

Correct Option: C
Detailed Answer: The cluster Manager is responsible for the operation of a collection of
computers that are connected via high-speed local area networks in the cloud computing
paradigm.

QUESTION 9:
Hypervisor is also known as
A. Cluster Manager
B. Virtual Machine Handler
C. Virtual Machine Manager
D. Virtual Machine Monitor

Correct Option: D
Detailed Answer: The hypervisor is also known as Virtual Machine Monitor
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


QUESTION 10:
The following problems are addressed through Web services:
A. Firewall
B. Interoperability
C. Storage
D. Speed

Correct Option: A,B


Detailed Answer: Web services improve distributed interoperability by using open standards that
can enable any two software components to communicate. It is also intended to take care of
firewall issues.
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


Cloud Computing
Assignment-Week 3
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1:
Which of the following is/are properties of Web Service SLAs?

A. SLA automation is required for negotiation, provisioning, service delivery and monitoring.
B. The QoS parameters are response time, SLA violation rate for reliability, availability and cost of
service.
C. UDDI (Universal Description Discovery and Integration) is used for resource allocation.
D. The QoS parameters are related to security, privacy, trust, management, etc.

Correct Option: B, C
Detailed Answer: In Web SLA automation is not required. The QoS parameters are response time,
SLA violation rate for reliability, availability and cost of service and UDDI (Universal Description
Discovery and Integration) is used for resource allocation.

QUESTION 2:
A task takes time T in a uniprocessor system. In a parallel implementation, the task runs on P
processors parallelly. The parallel efficiency is Eff, where 0<Eff<1. What is the time taken by each
processor (M) in this implementation?
A. M = T
B. M = T/(Eff×P)
C. M = T/P
D. M = (T×Eff)/P

Correct Option: B
Detailed Answer: According to the question, parallel efficiency (Eff) is less than 1. Therefore, the
time taken by each processor will be greater than the ideal T/P, and M = T/(Eff ×P).
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


QUESTION 3:
Row-oriented storage is optimal for transaction processing applications.
A. True
B. False
Correct Option: A
Detailed Answer: From the definition of data storage techniques. (Slide no. 6 of Cloud
Computing: Managing Data).

QUESTION 4:
Which of the following is/are the SLA requirement(s) for PaaS cloud delivery model?.
A. Transparency
B. Data Retention and Deletion
C. Privacy
D. Regulatory compliance

Correct Option: A, C, D
Detailed Answer: Refer to the table provided in slide no. 17 of Service Level Agreement (SLA)
Lecture.

QUESTION 5:
In a cloud, total service uptime is 175 minutes and availability of the service is 0.85. What is the
service downtime?
A. 55 minutes
B. 148.75 minutes
C. 26.25 minutes
D. 45 minutes

Correct Option: C
Detailed Answer: Availability = 1 – (downtime/uptime).
Downtime = Uptime×(1-Availability) = 175*(1-0.85) = 26.25 minutes.
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


QUESTION 6:
Which of the following database system/architecture follow(s) Quorum protocol for a large number
of concurrent reads & writes?
A. BigTable
B. Dynamo
C. Datastore
D. Google File System (GFS)

Correct Option: B
Detailed Answer: Dynamo follows Quorum protocol for a large number of concurrent reads &
writes.

QUESTION 7:
Match the components of OpenStack with their functions.

Table I Table II

1. Neutron A. Block storage


2. Cinder B. Identity
3. Keystone C. Compute
4. Nova D. Networking

A. 1->B, 2->D, 3->A, 4->C


B. 1->B, 2->A, 3->D, 4->C
C. 1->C, 2->B, 3->D, 4->A
D. 1->D, 2->A, 3->B, 4->C

Correct Option: D
Detailed Answer: Neutron is used for networking, Cinder is used for block storage, Keystone is
used for identity and Nova is used for compute service.

QUESTION 8:
Let D(t) and R(t) be the instantaneous demand and resources at time t respectively. If demand is
exponential (D(t)=et), any fixed provisioning interval (tp) according to the current demands will
fall linearly behind.
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


A. TRUE
B. FALSE

Correct Option: B
Detailed Answer: If demand is exponential (D(t)=et), any fixed provisioning interval (tp)
according to the current demands will fall exponentially behind.

QUESTION 9:
Which of the following statement(s) regarding OpenStack storage is/are wrong?
A. Object storage is managed by Cinder
B. Both ephemeral storage and block storage are accessible from within VM
C. Block storage persists until VM is terminated
D. Ephemeral storage is used to run operating system and/or scratch space

Correct Option: A, C
Detailed Answer: Object storage is managed by Swift. Block storage persists until specifically
deleted by the user. Thus, statements A and C are false.

QUESTION 10:
Statement 1: Multiple KPIs are aggregated to SLA.
Statement 2: SLA contains SLO.
A. Both statement 1 and 2 are correct
B. Statement 1 is correct and statement 2 is incorrect
C. Statement 2 is correct and statement 1 is incorrect
D. Both statement 1 and 2 are incorrect

Correct Option: C
Detailed Answer: Multiple KPIs are aggregated to SLO. SLA contains SLO. So statement 1 is
incorrect and statement 2 is correct.
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


Cloud Computing
Assignment-Week 4
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1:
Azure app service plans define:
A. Instance size
B. Security
C. Region
D. Scale count
Correct Option: A, C, D
Detailed Answer: Azure app service plan defines instance size, region, scale count and SKU
(Stock-Keeping Unit). So the correct answers are A, C and D.

QUESTION 2:
In Azure, app service supports local Git to deploy content to a web app.
A. TRUE
B. FALSE

Correct Option: A
Detailed Answer: The statement is true. In Azure, app service supports local Git to deploy content
to a web app.

QUESTION 3:
Which of the following statement(s) is/are FALSE for Microsoft Azure Resource Group?
A. It is a logical container
B. It manages Azure resources
C. It is a physical container
D. It deploys web apps, databases, and storage accounts

Correct Option: C
Detailed Answer: A resource group is a logical container into which Azure resources like web
apps, databases, and storage accounts are deployed and managed. Hence, C is the only incorrect
answer.
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


QUESTION 4:
Identify the correct statement(s) on Google App Engine.
A. It is a part of Google Cloud Platform (GCP) “services” infrastructure
B. It is a Platform as a Service (PaaS) component of GCP
C. While using Google App Engine patching and maintenance would be checked continuously
D. It is a part of Google Cloud Platform (GCP) “compute” infrastructure

Correct Option: B, D
Detailed Answer: Google App Service is a part of GCP compute infrastructure. It is a Platform as
a Service (PaaS) component of GCP. Using App Engine, we can just focus on our code and do not
need to worry about patching or maintenance. So the correct options are B and D.

QUESTION 5:
Google Cloud Datastore provides flexible object storage with global edge caching.
A. TRUE
B. FALSE

Correct Option: B
Detailed Answer: Google Cloud Storage, not Datastore provides flexible object storage with
global edge caching. So the statement is false.

QUESTION 6:
Statement 1: In Microsoft Azure, a deployment user is required for FTP and local Git deployment
to a web app.
Statement 2: When deploying the Azure app remotely, the login password of the Azure account
needs to be entered when the system asks for password.
A. Statement 1 is True and Statement 2 is False
B. Statement 1 is False and Statement 2 is True
C. Both are True
D. Both are False

Correct Option: A
Detailed Answer: A deployment user is required for FTP and local Git deployment to a web app in
Microsoft Azure. When deploying the Azure app remotely, the password created while configuring
the deployment user should be used, not the password used to log in to the Azure portal. So the
correct option is A.
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


QUESTION 7:
Match the following columns:

Column I Column II

A. GoogleAppEngine 1. Integrates Google’s services into end users’ application


B. GoogleCloudEndpoints 2. Helps end users’ application scalability
C. GoogleAPI 3. Helps to migrate web application to Google Cloud
Platform

A. A-1, B-2, C-3


B. A-3, B-2, C-1
C. A-3, B-1, C-2
D. A-2, B-1, C-3

Correct Option: B
Detailed Answer: GoogleAppEngine helps to migrate web applications to Google Cloud Platform.
GoogleCloudEndpoints help end users’ application scalability. GoogleAPIs integrate Google’s
services into end users’ applications. So, the correct option is B.

QUESTION 8:
While developing a web-app using Google App Engine, the development server should not be kept
running when changes are made to the source file.
A. TRUE
B. FALSE

Correct Option: B
Detailed Answer: The development server can be kept running while the application is being
developed in Google App Engine. The development server watches for changes in the source files
and reloads them if necessary. Hence, the statement is false.

QUESTION 9:
Identify the correct statement(s) on OpenStack storage concepts:
A. Ephemeral storage is managed by Nova
B. Block storage is accessible from within VM as a local file system
C. Both Block storage and Object storage persist until specifically deleted by the user.
D. Object storage is used to add additional persistent storage to VM and/or run operating
system.
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


Correct Option: A, C
Detailed Answer: Ephemeral storage is managed by Nova. Block storage is accessible from
within VM as a block device (e.g. /dev/vdc). Both Block storage and Object storage persist until
specifically deleted by the user. Object storage is used to add store files, including VM images.
Hence A and C are correct.

QUESTION 10:
Which of the following is/are storage service(s) provided by Google Cloud Platform(GCP)?
A. BigQuery
B. Cloud SQL
C. Cloud Datastore
D. Cloud Endpoints

Correct Option: B, C
Detailed Answer: Cloud SQL and Cloud Datastore are the storage services mentioned here
provided by GCP. Hence, B and C are correct.
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


Cloud Computing
Assignment-Week 5
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1:

____ is a formal contract between a Service Provider (SP) and a Service Consumer (SC).

A. SLA
B. KPI
C. SLO
D. Utility Premium

Correct Option: A
Detailed Answer: SLA (Service Level Agreement) is a formal contract between a Service Provider
(SP) and a Service Consumer (SC) in slide 2 of SLA. So the correct option is A.

QUESTION 2:
If demand is exponential (D(t)=et), any fixed provisioning interval (tp) according to the current
demands will fall linearly behind.
A. TRUE
B. FALSE

Correct Option: B
Detailed Answer: If demand is exponential (D(t)=et), any fixed provisioning interval (tp)
according to the current demands will fall exponentially behind.

QUESTION 3:
A third party application runs in the cloud for 18 hours/day. At the end of one month (30 days), it
was found that the cloud suffered outages totalling 5 hours and T hours, on different days over the
service period. The cloud guarantees service availability for 98% of the time. What are the value(s)
of T among the given options such that the SLA negotiation does not get honored in terms of
service availability?
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


A. 4 hours
B. 5 hours
C. 6 hours
D. 8 hours

Correct Option: C, D
Detailed Answer: Total Outage: (5+T) hours, application runs for 540 hours in a month.
Availability = 1 - (downtime/uptime). For availability: [1- {(5+T)/(535-T)}] >= 0.98, T<=5.59 hours.
Options C and D are correct as the SLA negotiation does not get honored.

QUESTION 4:
What is/are the correct statement(s) regarding VM load management?
A. When load increases, new VMs should be scheduled to new nodes.
B. When load decreases, use WOL to start up waiting nodes.
C. When load increases, use WOL to start up waiting nodes.
D. When load decreases, live migrate VMs to more utilized nodes.

Correct Option: A, C, D
Detailed Answer: When load decreases, VMs should be live migrated to more utilized nodes.
When load increases, WOL should be used to start up waiting nodes and new VMs should be
scheduled to new nodes.

QUESTION 5:

Statement I: In resource management, resource allocation is the allocation of a service provider's


resources to a customer.
Statement II: Resource mapping is correspondence between resources required by the users and
resources available with the provider.
Which of the options is correct?

A. Statement I is TRUE and Statement II is FALSE


B. Statement II is TRUE and Statement I is FALSE
C. Both statements are TRUE
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


D. Both statements are FALSE

Correct Answer: B
Detailed Solution: Refer slide 10 in Resource Management - II. In resource management, resource
allocation is the distribution of resources economically among competing groups of people or
programs. Statement II is true. Hence, option B is correct.

QUESTION 6:
Which of the following is/are resource allocation approaches in resource management?

A. Intelligent multi-agent model


B. Network queueing model
C. Energy-aware resource allocation
D. Reinforcement learning guided control policy

Correct Answer: A, C
Detailed Solution: Intelligent multi-agent model and energy-aware resource allocation are
resource allocation approaches. Network queueing model is a resource provisioning approach and
reinforcement learning guided control policy is a resource adaptation approach..

QUESTION 7:
Consider that the peak computing demand for an organization is 250 units. The demand as a
function of time can be expressed as D(t) = 5t. Baseline (owned) unit cost is 120 and cloud unit
cost is 150. The cloud is owned for a period of T time units. Select the values of T for which cloud
is cheaper than owning.
A. 50
B. 100
C. 150
D. 200

Correct Option: A
Detailed Answer: Total baseline cost BT = P ⨯ B ⨯ T = 250*120*T = 30,000*T units.
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


𝑇 𝑇 𝑇
2
𝑡
Total cloud cost CT = ∫ 𝐶 * 𝐷(𝑡)𝑑𝑡 = ∫ 150 * 5𝑡 𝑑𝑡 = 750* [ 2
] = 375*(T2) units
0 0 0
2
Utility function UT = (CT/BT) = 375*T /30,000*T = T/80.

For T = 50 units, cloud is cheaper than owning. For all the other cases, cloud is costlier than
owning.

QUESTION 8:
Which of the following is/are objective(s) of Resource Management?
A. Increased latency
B. Scalability
C. Improved throughput
D. Improved security

Correct Option: B, C
Detailed Answer: From the objectives outlined in slide 9 of Resource Management - II.

QUESTION 9:
In computing, there is a nonlinear relationship between the number of processing cores used and
power consumption
A. TRUE
B. FALSE

Correct Option: A
Detailed Answer: Refer to slide 10 of resource management-I.

QUESTION 10:
If demand is flat, the penalty will be linear.
A. TRUE
B. FALSE
Correct Answer: B
Detailed Solution: If demand is flat, the penalty will be zero.
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


Cloud Computing
Assignment-Week 6
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1:
Interception is an attack on:
A. Integrity
B. Availability
C. Confidentiality
D. Authenticity

Correct Option: C
Detailed Answer: Interception is an attack on confidentiality.

QUESTION 2:
Which of the following is/are the recovery goal(s) of the security mechanism?
A. Stop attack, assess and repair damage
B. Detect attackers’ violation of security policy
C. Prevent attackers from violating security policy
D. Continue to function correctly even if attack succeeds

Correct Option: A, D
Detailed Answer: Refer slide no. 8 of Cloud-Security I.

QUESTION 3:
Replay attack, which is the passive capture of a data unit and its subsequent retransmission to
produce an unauthorized effect, is an active attack.
A. True
B. False

Correct Option: A
Detailed Answer: Replay attack is an active attack.
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


QUESTION 4:
Statement I: Authorization is the identification of legitimate users.
Statement II: Integrity is the protection against data alteration/corruption.

A. Statement I is TRUE and statement II is FALSE.


B. Statement I is FALSE and statement II is TRUE.
C. Both statements are TRUE.
D. Both statements are FALSE.

Correct Option: B
Detailed Answer: Refer slide no. 18 of Cloud-Security I. Authorization is the determination of
whether or not an operation is allowed by a certain user. Integrity is the protection against data
alteration/corruption. So the first statement is false and the second statement is true.

QUESTION 5:
Which of the following is/are NOT passive attacks?
A. Masquerade
B. Release of message contents
C. Denial of service
D. Modification

Correct Option: A, C, D
Detailed Answer: Only release of message contents is a passive attack. The others are
active attacks.

QUESTION 6:
In full virtualization, VMs interact with the host OS.
A. True
B. False

Correct Option: B
Detailed Answer: In full virtualization, VMs run on hypervisor that interacts with the hardware.
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


QUESTION 7:
When selecting the most suitable cloud provider satisfying customer’s QoS requirements using a
fuzzy inference engine, if the “Degree of SLA Satisfaction” is greater than the “Threshold for a
cloud service provider”, the customer should migrate to a different provider.
A. True
B. False

Correct Option: B
Detailed Answer: Refer slide 16 of Broker for Cloud Marketplace. Migration should be done when
Degree of SLA Satisfaction < Threshold.

QUESTION 8:
Which of the following Open-source tools is/are used to perform TCP connect probes in Amazon
EC2 platform?
A. wget
B. nmap
C. ifconfig
D. hping

Correct Option: B
Detailed Answer: nmap is an open-source tool which is used to perform TCP connect probes
(attempt to complete a 3-way hand-shake between a source and target) in Amazon EC2. refer to
slide 12 of Cloud Security III.

QUESTION 9:
Statement I: Recovery Point Objective (RPO) is the maximum amount of data that will be lost
following an interruption or disaster.
Statement II: Recovery Time Objective (RTO) is the amount of data that will be lost following an
interruption or disaster.

A. Statement I is TRUE and statement II is FALSE.


B. Statement I is FALSE and statement II is TRUE.
C. Both statements are TRUE.
D. Both statements are FALSE.

Correct Option: A
Detailed Answer: Recovery Time Objective (RTO) is the period of time allowed for recovery i.e.,
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


the time that is allowed to elapse between the disaster and the activation of the secondary site.

QUESTION 10:
List the motivation(s) in having a ‘middle man’ or intelligent broker for cloud marketplace:

A. Trustworthiness of the provider.


B. Monitoring of services.
C. Ensuring vendor lock-in.
D. Flexible selection of cloud provider.

Correct Option: A, B, D
Detailed Answer: Refer slide 4 of Broker for Cloud Marketplace.
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


Cloud Computing
Assignment-Week 7
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1:
Fog Computing is applicable in
a) Smart Grid
b) Smart Traffic Light
c) Connected Vehicles
d) None of the above

Correct Answer: a, b, c
Detailed Solution: Fog computing is implemented in Smart Grid, Start Traffic light, Connected
Vehicles. So, the correct options are (a), (b), and (c).

QUESTION 2:
Fog Computing has ________ probability to attack on data enrouter and required ________
number of server nodes than Cloud Computing.
a) lower , less
b) lower, large
c) higher, less
d) higher, large

Correct Answer: b
Detailed Solution: Fog Computing has a lower probability to attack on data enrouter and required
a large number of server nodes than Cloud Computing. Refer to Lecture 34.

QUESTION 3:
Consider the following statements:
Statement 1: In Geospatial Cloud, it is needed to integrate data from heterogeneous back-end data
service.
Statement 2: Data services can be inside and/or outside of the cloud environment in Geospatial
Cloud.
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


a. Statement 1 is Correct, but Statement 2 is Incorrect.
b. Statement 2 is Correct, but Statement 1 is Incorrect.
c. Both statements are Correct.
d. Both statements are Incorrect
Correct Answer: c

Detailed Solution: Both statements are correct regarding Geospatial Cloud concept. So, the correct
option is (c). Refer to Lecture 35.

QUESTION 4:

Which of the following is/are the challenge(s) of the Geospatial Cloud?

a) Scaling of Spatial Databases


b) Policy management among the tenants
c) Implementation of Spatial Databases
d) None of the above

Correct Answer: a, b, c
Detailed Solution: Challenges of Geospatial Cloud are as follows-
1. Implementation of Spatial Databases
2. Scaling of Spatial Databases
3. Policy management among the tenants
So, the correct options are (a), (b), (c).

QUESTION 5:

Which of the following is/are feature(s) of Mobile Cloud Computing?

a) Uses less mobile device resources because applications are cloud-supported


b) Reduces reliability with information backed up and stored in the cloud
c) Mobile devices connect to services delivered through an API architecture
d) Facilitates slower development, delivery and management of mobile apps
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


Correct Answer: a, c
Detailed Solution: Mobile cloud computing features are: Facilitates the quick development,
delivery and management of mobile apps. Uses fewer device resources because applications are
cloud-supported. Mobile devices connect to services delivered through an API architecture.
Improves reliability with information backed up and stored in the cloud. So, the correct options are
(a) and (c).

QUESTION 6:
Which of the following statement(s) is/are FALSE about Fog Computing?

a) Fog nodes present near to the end-user


b) Fog computing enables real-time applications
c) Fog nodes’ response time is much higher than Cloud’s
d) Network routers, WiFi Gateways will not be capable of running applications

Correct Answer: c, d
Detailed Solution: Fog nodes present near to the end-user, Fog computing use for real-time
applications, Fog nodes’ response time is much lower than cloud server, network routers, WiFi
Gateways will be capable of running applications. So, the correct options are (c), (d).

QUESTION 7:
Choose the most appropriate option regarding CLOUDLET code offloading.
Statement 1: The architecture reduces latency by using a multi-hop network.
Statement 2: It potentially lowers battery consumption by using Wi-Fi or short range radio.
a. Statement 1 is correct but Statement 2 is incorrect
b. Statement 2 is correct but Statement 1 is incorrect
c. Both the statements are correct
d. Both the statements are incorrect.

Correct Answer: b

Detailed Solution: The architecture reduces latency by using a single-hop network and potentially
lowers battery consumption by using Wi-Fi or short range radio. So, the correct option is (b).
Refer Lecture 32.
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


QUESTION 8:
Benefits of Fog Computing is/are:

a. Immobility
b. Low latency and location-aware.
c. Homogeneity
d. Widespread geographical distribution.

Correct Answer: b, d
Detailed Solution: Benefits of Fog Computing are (i) Very large number of nodes are involved, (ii)
Low latency and location-aware, (iii) Heterogeneity and (iv) Widespread geographical distribution.
So, correct option is (b) and (d).

QUESTION 9:

Distance between the client and server in Cloud Computing is of _________ and Fog computing is
_______.

a) One Hop, Multiple Hop


b) One Hop, One Hop
c) Multiple Hop, One Hop
d) Multiple Hop , Multiple Hop

Correct Answer: c
Detailed Solution: Distance between the client and server in Cloud Computing is of multiple hop
and Fog computing is one hop. Refer Lecture 34.

QUESTION 10:
Match the following tables related to Mobile Cloud Computing key components:
Table – I Table – II

Table – I Table – II

1. Profiler i. Collects results of split execution and


2. Solver combine, and make the execution
3. Synchronizer details transparent to the user
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


ii. Monitors application execution to collect
data about execution time, power
consumption, network traffic
iii. The task of selecting which parts of an app
runs on mobile and cloud

a. 1. -> (ii), 2. -> (iii), 3. -> (i)


b. 1. -> (iii), 2. -> (i), 3. -> (ii)
c. 1. -> (i), 2. -> (ii), 3. -> (iii)
d. 1. -> (ii), 2. -> (i), 3. -> (iii)
Correct Answer: a

Detailed Solution:
Profiler monitors application execution to collect data about the time to execute, power
consumption, network traffic. Solver has the task of selecting which parts of an app runs on
mobile and cloud. Task of synchronizer modules is to collect results of split execution and
combine, and make the execution details transparent to the user. So, the correct option is (a).
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


Cloud Computing
Assignment-Week 8
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1:
For sensor resources that do not have direct connection to the cloud, sensor network proxy
provides the connection.
a) True
b) False

Correct Answer: a

Detailed Solution: For sensor resources that do not have direct connection to the cloud, sensor
network proxy provides the connection. So, the correct option is (a). Lecture 38, 22:10 min.

QUESTION 2:
Docker compose is a tool for defining and running multi-container Docker
applications.
a) True
b) False
Correct Answer: a
Detailed Solution: Docker compose is a tool for defining and running multi-container
Docker applications. So, the correct option is (a). Lecture 36, 18:17 min.

QUESTION 3:
What does “ps” signify as per Container terminology?

a) List of all containers


b) List of all running containers
c) List of all stopped containers
d) List of all warm containers
Correct Answer: b
Detailed Solution: ps : list all running containers
ps -a : list all containers (including stopped). Lecture 36, 29:58 min.
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


QUESTION 4:
Statement 1: Sensor-Cloud proxy exposes sensor resources as cloud services.
Statement 2: Sensor network is still managed from the Sensor-Cloud Interface via Sensor
Network Proxy
a. Statement 1 is True and Statement 2 is False
b. Statement 2 is True and Statement 1 is False
c. Both statements are True
d. Both statements are False
Correct Answer: c
Detailed Solution: Sensor cloud proxy exposes sensor resources as cloud services.
Sensor network is still managed from the Sensor-Cloud
Interface via Sensor Network Proxy. Lecture 38, 21:43 min.- 22:09 min

QUESTION 5:
Choose the most appropriate option.
Statement 1: An image is a lightweight, stand-alone, executable package that includes everything
to run a piece of software.
Statement 2:Container is a run time instance of an image.

a. Statement 1 is correct but Statement 2 is incorrect


b. Statement 2 is correct but Statement 1 is incorrect
c. Both the statements are correct
d. Both the statements are incorrect.

Correct Answer: c
Detailed Solution: Both the statements are correct. Lecture 36, 20:51 min

QUESTION 6:
Sensor data can be easily shared by different groups of users without any extra effort/ measure.
a. True
b. False
Correct Answer: b
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


Detailed Solution: One of the limitations of Sensor Networks is “Sensor data can not be easily
shared by different groups of users.” Hence, the correct option is (b). Lecture 38, 9:32 min.

QUESTION 7:
An IoT platform’s basic building blocks is/ are (choose the correct option(s)).
a. Gateway
b. Images
c. Network and Cloud
d. Containers
Correct Answer: a, c
Detailed Solution: An IoT platform has three basic building blocks, Things, Gateway, and Network
and Cloud. Lecture 39, 10:09 min.

QUESTION 8:
Docker rmi is used to delete a local _________
a. image
b. container
c. volume
d. node
Correct Answer: a
Detailed Solution: Docker rmi is used to delete a local image. So, the correct option is (a).

QUESTION 9:
In the context of Green Cloud Computing, the Power Usage Effectiveness is defined as
a. Power Delivered / Overall Power
b. Overall Power / Power Delivered
c. Overall Power * Power Delivered
d. None of these

Correct Answer: b
Detailed Solution: In the context of Green Cloud Computing, the Power Usage Effectiveness is
defined as Overall Power / Power Delivered. So, the correct option is (b). Lecture 37, 28:45 min.

QUESTION 10:
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


Vehicles providing their networking and data processing capabilities to other vehicles through the
cloud come under which service of IoT-based Vehicular Data Clouds.
a. SaaS
b. PaaS
c. IaaS
d. None of these
Correct Answer: c
Detailed Solution: Vehicles provide their networking and data processing capabilities to other
vehicles through the cloud comes under the Networking and Data processing as a service (IaaS)
of IoT-based Vehicular Data Clouds under IaaS service. Hence, the correct option is (c). Lecture
39, 28:02 min.
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


Cloud Computing
Assignment-Week 9
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1:
Fog computing is a model in which data, processing and applications are concentrated in devices
at the __________ rather than existing almost entirely in the cloud.
a. fog
b. local node
c. network station
d. network edge
Correct Answer: d
Detailed Solution: Fog computing is a model in which data, processing and applications are
concentrated in devices at the network edge rather than existing almost entirely in the cloud. So
the option is (d).

QUESTION 2:
In the Cloud-Fog-Edge Computing paradigm, sensors being end devices, can perform basic data
processing
a. True
b. False
Correct Answer: a
Detailed Solution: In the Cloud-Fog-Edge Computing paradigm, sensors being end devices, are
able to perform basic data processing.

QUESTION 3:
What is(are) the benefit(s) of Fog computing?
a. Provides less data location-awareness
b. Increases network congestion
c. Causes lesser latency permits usage in real-time applications
d. None of these
Correct Answer: c
Detailed Solution: Fog always decreases latency permits in real-time applications.
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


QUESTION 4:
The ___________ used for resource management in fog/edge computing are classified on the basis
of data flow, control and tenancy.
a. Algorithms
b. Architectures
c. Hardware
d. Infrastructure

Correct Answer: b
Detailed Solution: The architectures used for resource management in fog/edge computing is
classified based on data flow, control, and tenancy.

QUESTION 5:
Virtualization software is an example of __________.
a. Application software
b. Middleware
c. System software
d. Benchmarking

Correct Answer: c
Detailed Solution: Virtualization software is an example of System software.

QUESTION 6:
Fog infrastructure consists of IoT devices, Fog Nodes, and at least one Cloud Data Center never
ensures scalability
a. True
b. False

Correct Answer: b
Detailed Solution: Scalability is one of the characteristics of fog computing.

QUESTION 7:
What is(are) the application placement constraint(s) for fog nodes?
a. Network constraints
b. Interoperability
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


c. Resource constraints
d. None of these

Correct Answer: a,c


Detailed Solution: Network constraints: such as latency, bandwidth, etc. and these constraints
need to be considered when deploying applications.
Resource constraints: an infrastructure node is limited by finite capabilities in terms of CPU, RAM,
storage, bandwidth, etc. While placing application(s) (service components), the resource
requirements need to be considered.

QUESTION 8:
Cloud Federation should prefer maximum geographical separation.

a. True
b. False

Correct Answer: a
Detailed Solution: Cloud Federation should prefer maximum geographical separation.

QUESTION 9:
Benefit(s) of cloud federation is(are)
a. Global Utility
b. Resource utilization minimization
c. Power consumption maximization
d. All of these

Correct Answer: a
Detailed Solution: Benefits of cloud federation are: Maximize resource utilization; Minimize
power consumption; Load balancing; Global utility; Expand CSP’s global foot prints

QUESTION 10:
A CSP has little or no control over remote resources in case of
a. Tightly Coupled Federation
b. Medium Coupled Federation
c. Loosely Coupled Federation
d. None of these
Correct Answer: c
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


Detailed Solution: In loosely coupled federation, a CSP has little or no control over remote
resources (for example, decisions about VM placement are not allowed), monitoring information is
limited (for example, only CPU, memory, or disk consumption of each VM is reported), and there
is no support for advanced features such as cross‐site networks or VM migration.
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


Cloud Computing
Assignment-Week 10
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1:
Post-copy and Pre-copy migration approaches are followed in :
a. Live Migration process
b. Non-live Migration process
c. Hybrid Migration process
d. None of these

Correct Answer: a
Detailed Solution: Both Post-copy and Pre-copy are approaches for the live migration process.

QUESTION 2:
Private Docker registry is a service that stores Docker images.

a. True
b. False

Correct Answer: a
Detailed Solution: Private Docker registry is a service that stores Docker images.
Moreover, Docker on the host machine is split into two parts- a daemon with RESTful API and a
client who talks with the daemon.

QUESTION 3:
What is(are) the key advantage(s) of Docker?

a. Facilitating microservices
b. Modeling networks.
c. Packaging software
d. None of these

Correct Answer: a,b,c


Detailed Solution: Facilitating microservices, packaging software, and modeling networks for
initiating multiple isolated containers on a single machine, are the key advantages of Docker.
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


QUESTION 4:
Which of the following statement is most appropriate about Docker ?

a. Docker is a platform that allows to build and run but not ship apps.

b. Docker is a platform that allows to build and ship but but not to run apps.

c. Docker is a platform that allows to build, ship and, run apps.

d. Docker is a platform that only allows to ship and run but not to build apps.

Correct Answer: c

Detailed Solution: Docker is a platform that allows to build, ship and, run any app anywhere.

QUESTION 5:
A Kubernetes cluster consists of set of worker machines , called _________ .

a. Pods
b. Nodes
c. Control plane
d. Centers
Correct Answer: b
Detailed Solution: A Kubernetes cluster consists of set of worker machines , called nodes.

QUESTION 6:
Docker builds are more reproducible and and replicable than traditional software building methods.

a. True
b. False
Correct Answer: a
Detailed Solution: Docker builds are more reproducible and and replicable than traditional
software building methods. This makes implementing CD much easier.

QUESTION 7:
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


Containers are similar to VMs but they have unrelaxed isolation properties to share the operating
system among the applications.

a. True
b. False

Correct Answer: b
Detailed Solution: Containers are similar to VMs but they have relaxed isolation properties to
share operating system among the applications. Therefore, containers are considered lightweight.

QUESTION 8:
In Docker utility, ___________ is a collection of filesystem layers and some metadata that, if taken
together, can be spun up as Docker containers.

a. Operating System
b. Microservice
c. Virtual Machine
d. Image

Correct Answer: d
Detailed Solution: In Docker utility, an image is a collection of filesystem layers and some
metadata which if taken together, they can be spun up as Docker containers.

QUESTION 9:
With VM memory size of 1024 GB and the transmission rate to be 16 MB/sec
What is the total migration time ? Choose the closest correct option.

a. 32 hours
b. 18 hours
c. 26 hours
d. 24 hours

Correct Answer: b
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


Detailed Solution: Total Migration time = VM memory size/ transmission rate
=(1024x2^30)/(16x2^20)=65536 secs= 18 hours.

QUESTION 10:
Choose the most appropriate option.
Statement 1: Container is a lightweight virtualization technique.
Statement 2: Container contains the code and all its dependencies.

a. Only statement 1 is true


b. Only statement 2 is true
c. Both statement 1 and 2 are true
d. Bothe the statements are false

Correct Answer: c
Detailed Solution: Container is a lightweight virtualization technique. Container contains the code
and all its dependecies so the applications run quickly.
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


Cloud Computing
Assignment-Week 11
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1:
_________are an important distribution mechanism for libraries and custom runtimes in AWS
serverless ecosystem.
a. Runtimes
b. Lambda Layers
c. Log streams
d. None of these

Correct Answer: b
Detailed Solution: Lambda layers are an important distribution mechanism for libraries, custom
runtimes and other imp function dependencies in AWS serverless ecosystem. So, the correct option
is (b).

QUESTION 2:
______________ is a fully managed proprietary NoSQL database service that supports key–value
and document data structures.
a. Amazon DynamoDB
b. AWS S3
c. AWS Lambda
d. Amazon EFS

Correct Answer: a
Detailed Solution: Amazon DynamoDB is a fully managed proprietary NoSQL database service
that supports key–value and document data structures and is offered by Amazon.com as part of the
Amazon Web Services portfolio. Whereas, Amazon S3 is a simple storage service .

QUESTION 3:
Which component(s) of CDCs contribute(s) to consumption of huge amount of energy ?
a. Network
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


b. Storage
c. Memory
d. Cooling system

Correct Answer: a,b,c,d


Detailed Solution: All of these components mentioned are responsible for consumption of
energy in CDCs.

QUESTION 4:
Serverless covers a wide range of technologies that can be grouped into two categories

a. BaaS and YaaS


b. FaaS and BaaS
c. FaaS and YaaS
d. None of these

Correct Answer: b

Detailed Solution: Serverless covers a wide range of technologies that can be grouped into two
categories Faas and BaaS.

QUESTION 5:
Runtimes allows you to annotate your function code with custom logging statements which helps
you to analyse the execution flow and performance of your AWS Lambda functions.

a. True
b. False

Correct Answer: b
Detailed Solution: Log stream allows you to annotate your function code with custom logging
statements which helps you to analyse the execution flow and performance of your AWS Lambda
functions. . So, the correct option is (b).

QUESTION 6:
Which of the following is not a category of a research initiative on sustainable cloud computing?

a. Renewable Energy
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


b. Capacity planning
c. Environment Sandboxing
d. None of these

Correct Answer: c
Detailed Solution: Environment Sandboxing is not a category of research initiative on sustainable
cloud computing. The other two options are. So, the correct option is (c ).

QUESTION 7:
VMs can be migrated to a remote CDC to balance the load effectively as per sustainable cloud
computing model.

a. True
b. False
Correct Answer: a
Detailed Solution: VMs and workloads can be migrated to a remote CDC to balance the load
effectively as per sustainable cloud computing model.

QUESTION 8:
The focus of cloud computing was _________ and the serverless is __________.

a. programmers, system administrators


b. system administrators, programmers

Correct Answer: b
Detailed Solution: The focus of cloud computing was system administrators and the serverless is
programmers.

QUESTION 9:
In Google Cloud Functions, the code executes in a fully managed environment.
a. True
b. False
Correct Answer: a
Detailed Solution: In Google Cloud Function, the code executes in a fully managed environment.
There is no need to provision any infrastructure.

QUESTION 10:
Which of the following is/are the goal of sustainable cloud computing? Choose appropriate
JAN-2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


option(s).
a. Minimizing the energy consumption.
b. Increasing reliability of CDCs.
c. Maximizing carbon footprint related cost.
d. Increasing network traffic

Correct Answer: a,b


Detailed Solution: Focus on minimizing the energy consumption and carbon footprint and
ensuring reliability of CDCs is the goal of sustainable cloud computing.
JAN - 2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


Cloud Computing
Assignment-Week 12
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1:
What is the purpose of 5G wireless technology?

a. Deliver lower data speeds


b. Deliver higher data speeds
c. Decrease network capacity
d. Decrease availability

Answer: b

Detailed Solution: 5G wireless technology is meant to deliver higher multi‐Gbps peak data
speeds, ultra-low latency, more reliability, massive network capacity, increased availability, and a
more uniform user experience to more users.

QUESTION 2:

What is the benefit of 5G's ability to scale down in data rates, power, and mobility for IoT devices?
a. It provides extremely lean and low-cost connectivity solutions
b. It allows for faster data rates and lower latency
c. It enables immersive experiences like VR and AR
d. It provides ultra-reliable, low-latency links for mission-critical communications.

Answer: a
Detailed Solution: 5G is meant to seamlessly connect a massive number of embedded sensors
in virtually everything through the ability to scale down in data rates, power, and
mobility—providing extremely lean and low‐cost connectivity solutions

QUESTION 3:
How are mobile devices connected to mobile networks in Mobile Cloud Computing?
a. Through cloud storage servers
b. Through remote access protocols
c. Through base stations such as base transceiver station, access point, or satellite
JAN - 2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


d. Through peer-to-peer connections

Answer: c
Detailed Solution: Mobile devices are connected to mobile networks via base stations (e.g., base
transceiver station, access point, or satellite).

QUESTION 4:
What drives the need for heterogeneous and distributed computing architectures?

a. Resource-constrained low-latency devices


b. Distant cloud data centres
c. High-speed internet connections
d. Availability of low-cost computing devices

Answer: a
Detailed Solution: On‐premises and edge data centers will continue to close the gap between
resource‐constrained low‐latency devices and distant cloud data centers, leading to driving the
need for heterogeneous and distributed computing architectures.

QUESTION 5:
What are the different aspects of CPS?

a. Cyber, physical, and communication only


b. Cyber, dynamics, and safety only
c. Cyber, physical, and computation only
d. Cyber, physical, computation, dynamics, communication, security, and safety

Answer: d
Detailed Solution: Refer slide 6 of Module 12: Cloud Computing Paradigms; Lecture 57.

QUESTION 6:
What role will service orchestration play in the future of industrial applications?

a. It will limit the interaction of industrial applications with network resources


JAN - 2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


b. It will not influence traffic routing for industrial applications.
c. It will enable industrial applications to interact with the network resources in advanced
ways.
d. It will not select the location and quality of service for industrial applications.

Answer: c
Detailed Solution: Service orchestration will play a key role moving forward, enabling industrial
applications to interact with the network resources in advanced ways such as selecting location,
quality of service, or influencing the traffic routing to deliver on application demands

QUESTION 7:

What is the purpose of spatial analysis?

a. To study the characteristics of people and their behaviors


b. To study the characteristics of places and regions and their relationships
c. To analyze financial data and make investment decisions
d. To create maps of the physical world

Answer: b
Detailed Solution: Spatial analysis is an attempt to solve location‐oriented problems and a better
understanding of where and what is occurring in the surrounding world/ region. – Beyond mapping
‐ study the characteristics of places/ regions and the relationships between them.

QUESTION 8:
How is the signal obtained from the accelerometer data for activity detection?

a. By calculating the square root of the x-axis, y-axis, and z-axis signals
b. By averaging the x-axis, y-axis, and z-axis signals
c. By subtracting the x-axis, y-axis, and z-axis signals
d. By multiplying the x-axis, y-axis, and z-axis signals

Answer: a

Detailed Solution: The collected data has three components: x‐axis, y‐axis, z‐axis.
A = sqrt(x*x + y*y + z*z)
JAN - 2023

NPTEL Online Certification Courses


Indian Institute of Technology Kharagpur


QUESTION 9:
According to the given definition, which of the following statement(s) is (are) true about dew
computing?

a. Dew computing is a cloud computing paradigm where all computing is done on the cloud
without any reliance on on-premises computers.
b. Dew computing is a paradigm where on-premises computers provide functionality that is
dependent on cloud services.
c. Dew computing is a paradigm where on-premises computers and cloud services are
completely isolated from each other and do not collaborate in any way.
d. Dew computing is a paradigm where on-premises computers provide functionality that is
independent of cloud services and is also collaborative with cloud services.

Answer: d
Detailed Solution: According to the definition given, dew computing is a paradigm where
on-premises computers provide functionality that is independent of cloud services and is also
collaborative with cloud services.

QUESTION 10:
According to the given objectives, which of the following statement(s) is (are) true about the
proposed health model?

a. The health model is designed for cloud computing and does not make use of fog or edge
computing.
b. The health model is designed for edge computing only and does not make use of cloud or
fog computing.
c. The health model is designed for fog-edge computing and aims to reduce latency, network
usage and cost incurred in the cloud.
d. The health model is designed for dew computing and does not make use of cloud, fog, or
edge computing.

Answer: c
Detailed Solution: According to the given objectives, the health model is designed for fog-edge
computing and aims to reduce latency, network usage and cost incurred in the cloud.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy